US8582761B2 - Cryptographic method with elliptical curves - Google Patents
Cryptographic method with elliptical curves Download PDFInfo
- Publication number
- US8582761B2 US8582761B2 US12/225,480 US22548007A US8582761B2 US 8582761 B2 US8582761 B2 US 8582761B2 US 22548007 A US22548007 A US 22548007A US 8582761 B2 US8582761 B2 US 8582761B2
- Authority
- US
- United States
- Prior art keywords
- elliptical curve
- order
- prime number
- tested
- twisted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/03—Arrangements for converting the position or the displacement of a member into a coded form
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
Definitions
- the present invention relates to a method for determining elliptical curves, in particular elliptical curves which are suitable for cryptographic data processing. Further, a cryptographic method and a facility are based on the elliptical curves previously selected.
- Cryptographic methods are used, among other purposes, for encrypting messages, signing documents and authenticating individuals or objects. Particularly suitable for this purpose are so-called asymmetric encryption methods, in which a participant is provided with both a private key, which is kept secret, and also a public key.
- the sender When encrypting a message, the sender makes use of the desired addressee's public key, and uses it to encrypt the message. Thereafter, only the addressee is in a position to decrypt the message again, using the private key known only to him.
- the signatory When signing a document, the signatory uses his private key to calculate from the document an electronic signature. Other people can directly verify the signature, using the signatory's public key. However, only signatures which were produced using the associated private key can be verified using the public key. As a result of this unique assignment, and assuming that the private key is kept secret by the signatory, there is a unique assignment of the signature to the signatory and to the document.
- a testing station In the case of authentication using a challenge-response protocol, a testing station communicates a request to a person asking them to calculate and send back a reply, using their private key. A positive authentication results if the testing station is able, using the public key of the individual to be checked, to verify the reply which is sent back.
- asymmetric cryptographic methods are based on a private and a public key.
- the public key is generated from the private key by a predefined algorithm.
- What is important for cryptographic methods is that the reverse, that is the determination of the private key from the public key, should not be manageable within a finite time with the computing capacities which are available. This is the case if the key length of the private key is greater than a minimum length. This minimum length for the key depends on the algorithms used for the encryption and on the determination of the public key.
- a 1 a 2 a 3 a s a s are constant chosen elements of a field K and the pairs (x, y) are points on the elliptical curve E and satisfy the Weierstra ⁇ equation.
- a finite field K is selected. Accordingly, the number of points on the elliptical curve E is also finite, and is referred to below as the order ord(E) of the curve E.
- one formal point is introduced at infinity.
- An abelian group structure G can be defined on the set of points on the elliptical curve.
- the operation of the abelian group structure is referred to below as addition, and is written additively.
- the addition of two arbitrary points on the elliptical curve gives a unique third point on this elliptical curve.
- Q is also a point on the elliptical curve.
- the determination of the scalar s for given points P and Q is referred to as the discrete logarithm problem for elliptical curves.
- the discrete logarithm problem for elliptical curves For a suitable choice of the field K and the parameters of the elliptical curve E it is impossible to solve the discrete logarithm problem in a reasonable time with the computing facilities presently available. The security of cryptographic methods using elliptical curves rests on this difficulty.
- the communication participant selects a scalar s as his private key, and keeps it secret.
- a start point P he generates the public key Q as the scalar multiple of the start point.
- the communication participants Owing to the high computational cost of the discrete logarithm problem, it is not possible to determine the private key s from the public key Q, which is what gives cryptographic methods using elliptical curves their security. Another requirement to be met by the elliptical curves is that their order should be a large prime number or the product of a large prime number and a small number.
- Cryptographic methods represent a compromise between an expected level of security and the computational cost for encrypting data. It is shown in DE 101 61 138 A1 that it is possible to determine the scalar multiple of a point solely by reference to the x-coordinates, without involving the y-coordinates. Appropriate computational rules are described for arbitrary fields in DE 101 61 138 A1. These permit significantly more efficient implementations of the point arithmetic to be achieved, e.g. a Montgomery ladder for the scalar multiplication, a smaller number of field multiplications per point addition and a smaller number of registers for the point representation and the intermediate results. However, with this method no check is made as to whether a point really is an element on the elliptical curve.
- DE 10161138 A1 describes the fact that it is possible by this means to effect a partial reconstruction of the encryption facility's private key. To prevent such a side-channel attack, DE 10161138 A1 uses specially selected elliptical curves. In doing so, the twisted elliptical curves associated with the elliptical curves were used as the criterion.
- the parameters v are all non-squares of the field K, if the characteristic of the field K is odd, or an element of the field K with trace 1 .
- all these twisted elliptical curves should also have an order which is a large prime number or the product of a large prime number with a small number.
- one potential object is to provide a method which selects elliptical curves which, when subject to a side-channel attack, do not enable any conclusions to be drawn about the private key.
- a method for determining an elliptical curve which is suitable for cryptographic methods with the following steps:
- a facility for confirming the identify of a person or an object having
- the proposed method uses an elliptical curve for the cryptographic method only if the twisted elliptical curve for this elliptical curve has an order which is a strong prime number.
- the strong prime number will be a so-called Sophie-Germain prime number, i.e. r is 2.
- the elliptical curves and the associated twisted elliptical curves conform to the definitions cited above.
- the proposed method prevents side-channel attacks which are based on x-coordinates which are communicated erroneously or on x-coordinates which are falsely communicated with malicious intent, where these x-coordinates do not correspond to any point on the selected elliptical curve.
- the proposed method is robust in the sense that even in the case of such x-coordinates it is not possible for an external device to spy out or partially determine the private key.
- the order of the twisted elliptical curve is determined by counting a number of points which lie on the twisted elliptical curve.
- the order of the twisted elliptical curve can also be determined on the basis of a determination of the order of the elliptical curve and the characteristic of the field. For this purpose, unique mathematical relationships between the different orders can be used. The counting of the points is effected using methods generally known to the specialist.
- an automatic check is made as to whether the order of the elliptical curve to be tested is a strong prime number, and the elliptical curve to be tested is then only selected for cryptographic methods if the order of the elliptical curve to be tested is a strong prime number.
- FIG. 1 a flow diagram of one potential embodiment of the proposed method
- FIG. 2 a block diagram of one potential embodiment of the proposed facility
- FIG. 3 a flow diagram of one potential embodiment of a method which is executed by the facility shown in FIG. 2 .
- FIG. 1 shows a flow diagram to illustrate one potential embodiment of the proposed method.
- a pool of elliptical curves E is provided (SI).
- the elliptical curves E are defined over a finite field K.
- a curve E contains a finite number of points P.
- the elliptical curve is defined by the Weierstra ⁇ equation and the parameters a 1 , a 2 , a 3 , a 4 , a 6 .
- Appropriate restrictions on or changes to the parameterization can reduce individual parameters to zero.
- the parameters are chosen such that the elliptical curves are not singular.
- the order of the elliptical curve is determined (S 2 ).
- the term order of an elliptical curve is to be understood as the number of points in a field K which satisfy the Weierstra ⁇ equation. A geometric interpretation of this is all the points P which lie on the elliptical curve E.
- the order of the elliptical curve should be a prime number. If the check shows that it is not a prime number another curve E is selected from the pool (S 8 ). If the order of the elliptical curve E is confirmed as a prime number, a check is then made on whether the order of the elliptical curve is a strong prime number (S 3 ). The definition of a strong prime number is given above.
- the twisted elliptical curves E for the elliptical curve E are checked.
- the definition of the twisted curves E′ has already been given above.
- the check is made for all the twisted curves E′, i.e. for all possible parameters v which do not correspond to a square or are an element with trace 1 .
- the order of the twisted curves E′ are determined individually (S 5 ).
- the order of the twisted curve E′ should also, like the elliptical curve, be a prime number. If this condition is not satisfied, another elliptical curve E is selected.
- a check is made in addition as to whether the order of the elliptical curve E′ is a strong prime number (E 6 ).
- the elliptical curve E is selected for a cryptographic method.
- FIG. 2 shows a block diagram of a test object A and a testing device B.
- the test object could be, for example, a smart card or an RFID chip.
- the testing device B is the appropriate reader.
- the test object A has a memory device 1 , in which is stored a private key KP. This private key KP is kept secret and cannot in any way be read out by an external device.
- a memory device 2 are stored the parameters required for parameterizing an elliptical curve E.
- a data processing device 3 executes an encryption algorithm based on the private key and an elliptical curve, defined by the parameters, which are held in the memory device 2 .
- the parameters or the elliptical curve, as appropriate, are determined using the method, e.g. by the exemplary embodiment shown in FIG. 1 .
- the test object has in addition a receiving device 4 , which can receive an x-coordinate of a point.
- This x-coordinate is fed to the data processing device 3 , which executes the previously defined method on it.
- the special features of this method are that it is applied only to the x-coordinate and also it requires only the x-coordinate of a point.
- the processed or encrypted x-coordinate is output by a transmission device 5 .
- the test object A does not check on whether the x-coordinate communicated could be a valid x-coordinate.
- the test object A does not check on whether this x-coordinate is assigned to a point P on the elliptical curve. However, the selected elliptical curves, which are held in the memory device 2 , do ensure that it is not possible to spy out or to partially spy out the private key using such an x-coordinate.
- the testing device B has a randomizer 10 , which selects an arbitrary point PO from the elliptical curve. This is communicated to the test object A by a transmission device 11 .
- the testing device B has in addition a receiving device for receiving the processed x-coordinate Q(x).
- a data processing device 13 checks the processed x-coordinate using a public key for the test object A. This public key may either be stored in the testing device B, or be obtained from an external source. If the encrypted value corresponds to the x-coordinate previously generated randomly, an output at an interface 14 indicates that the identity of the test object A has been confirmed.
- FIG. 3 shows this sequence of activities for the identification of a test object A, again schematically as a flow diagram.
- a randomizer generates a point PO on the elliptical curve E and communicates its x-coordinate to the test object A as a request.
- This uses its private key KP to calculate a reply from the x-coordinate (S 11 ).
- the test object communicates the reply Q(x) and if necessary also its public key KO.
- the reply is checked by the testing station B by the public key KO (S 12 ). In the event that this confirms the reply, a signal is output to the effect that the person A is authenticated or identified (S 13 , S 14 ).
- a suitable elliptical curve is quoted below by way of example.
Landscapes
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Physics (AREA)
- Computing Systems (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
- Complex Calculations (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
y 2 +a 1 xy+a 3 y=x 3 +a 2 x 2 +a 4 x+a 5
y 2 +va 1 xy+a 3 y==x 3 +va 2 x 2 +v 2 a 4 xv 3 a 5,
where the parameters a1, a2, a3, a4, a6 are the parameters of the elliptical curves. The parameters v are all non-squares of the field K, if the characteristic of the field K is odd, or an element of the field K with
-
- a receiving device which is used for receiving a coordinate,
- a storage device which keeps ready a private key for the person or the object,
- a processing device which is used to process the coordinate which has been received, using the private key, where the processing is based on an elliptical curve which is selected in accordance with one of the
methods 1 to 3, and - an output device which is set up to output the processed coordinate.
P=1+r·q,
where r is a small number, typically in the range up to 255, and q is a large prime number. Ideally, the strong prime number will be a so-called Sophie-Germain prime number, i.e. r is 2. The elliptical curves and the associated twisted elliptical curves conform to the definitions cited above. The proposed method prevents side-channel attacks which are based on x-coordinates which are communicated erroneously or on x-coordinates which are falsely communicated with malicious intent, where these x-coordinates do not correspond to any point on the selected elliptical curve. The proposed method is robust in the sense that even in the case of such x-coordinates it is not possible for an external device to spy out or partially determine the private key.
ord(E)+ord(E′)=2|K|+2
where |K| is the characteristic of the field K.
p=517847993827160675843549642866661055787617496734405781471
a=38341706974568098172697905376562415410863420236739650958
b=395393382584534989047698356330422317897630021672687214876
The order of the elliptical curve, ord(E)=517847993827160675843549642866661055787617496734522943517 and the twisted elliptical curve E′ for the elliptical curve E also has a prime order ord(E′)=517847993827160675843549642866661055787617496734288619427.
The basic point P=(x,y) is given by the coordinates
x=81094469663915015430255024705469171085831504304496796756
y=482060190644397986573077501327725919378173632606557848976
and lies on the elliptical curve E and in this case does indeed generate a complete group of points. I.e. each point on the elliptical curve E can be represented as a scalar multiple of the basic point P. Further, the orders of the curve E and the twisted curve E′ have the following values:
Ord(E)=1+4·129461998456790168960887410716665263946904 374183630735879
Ord(E′)=1+2·258923996913580337921774821433330527893808 748367144309713
Thus all the characteristics required of an elliptical curve for a cryptographic method are fulfilled.
Claims (20)
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102006013515A DE102006013515A1 (en) | 2006-03-23 | 2006-03-23 | Cryptographic method with elliptic curves |
DE102006013515.6 | 2006-03-23 | ||
DE102006013515 | 2006-03-23 | ||
PCT/EP2007/052075 WO2007107450A1 (en) | 2006-03-23 | 2007-03-06 | Cryptographic method with elliptical curves |
Publications (2)
Publication Number | Publication Date |
---|---|
US20090285388A1 US20090285388A1 (en) | 2009-11-19 |
US8582761B2 true US8582761B2 (en) | 2013-11-12 |
Family
ID=38190860
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/225,480 Active 2028-12-31 US8582761B2 (en) | 2006-03-23 | 2007-03-06 | Cryptographic method with elliptical curves |
Country Status (7)
Country | Link |
---|---|
US (1) | US8582761B2 (en) |
EP (1) | EP1997000A1 (en) |
JP (2) | JP2009531726A (en) |
KR (1) | KR101391216B1 (en) |
CN (1) | CN101410792B (en) |
DE (1) | DE102006013515A1 (en) |
WO (1) | WO2007107450A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12381729B2 (en) * | 2022-03-18 | 2025-08-05 | Stmicroelectronics Belgium | Protection of a secret key |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009118224A1 (en) * | 2008-03-25 | 2009-10-01 | Siemens Aktiengesellschaft | Method for the computer-supported determination of an elliptical curve for cryptographic applications |
US8621212B2 (en) | 2009-12-22 | 2013-12-31 | Infineon Technologies Ag | Systems and methods for cryptographically enhanced automatic blacklist management and enforcement |
US8630411B2 (en) | 2011-02-17 | 2014-01-14 | Infineon Technologies Ag | Systems and methods for device and data authentication |
CN102231666A (en) * | 2011-06-29 | 2011-11-02 | 电子科技大学 | Zero knowledge identity authentication method based on strong primes |
US9590805B1 (en) * | 2014-12-23 | 2017-03-07 | EMC IP Holding Company LLC | Ladder-based cryptographic techniques using pre-computed points |
Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5272755A (en) * | 1991-06-28 | 1993-12-21 | Matsushita Electric Industrial Co., Ltd. | Public key cryptosystem with an elliptic curve |
JPH1152853A (en) | 1997-07-30 | 1999-02-26 | Fujitsu Ltd | Prime number generation device, B-smoothness determination device, and recording medium |
JPH11234259A (en) | 1998-02-13 | 1999-08-27 | Hitachi Ltd | Opponent authentication and key distribution method, device using the same, and encryption communication method and encryption communication system |
US20020073311A1 (en) * | 2000-09-21 | 2002-06-13 | Ichiro Futamura | Public-key certificate issuance request processing system and public-key certificate issuance request processing method |
DE10161138A1 (en) | 2001-12-12 | 2003-07-03 | Siemens Ag | Elliptical curve determination method for cryptographic techniques involves evaluating curve to be tested as elliptical curve if defined cryptographic quality criterion is fulfilled for twisted elliptical curve |
JP2003255831A (en) | 2002-02-28 | 2003-09-10 | Hitachi Ltd | Elliptic curve scalar multiplication calculation method and apparatus |
DE10161137A1 (en) | 2001-12-12 | 2003-10-02 | Siemens Ag | Cryptographic data processing system for signature verification tests elliptical and twisted curves and uses one coordinate for data encryption and transmission |
US6738478B1 (en) * | 1998-10-28 | 2004-05-18 | Certicom Corp. | Power signature attack resistant cryptography |
US6829356B1 (en) | 1999-06-29 | 2004-12-07 | Verisign, Inc. | Server-assisted regeneration of a strong secret from a weak secret |
US20040250081A1 (en) * | 1991-09-17 | 2004-12-09 | Crandall Richard E. | Method and apparatus for digital signature authentication |
US20040264692A1 (en) * | 2003-06-30 | 2004-12-30 | Garay Juan A. | Method and system for determining sequence parameters to limit cycle attacks in timed release cryptography |
JP2005321719A (en) | 2004-05-11 | 2005-11-17 | Ntt Docomo Inc | COMMUNICATION SYSTEM, DECRYPTION DEVICE, RESTORE DEVICE, KEY GENERATION DEVICE, AND COMMUNICATION METHOD |
US20060153369A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Providing cryptographic key based on user input data |
US20060156013A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Digital signature software using ephemeral private key and system |
US20060153371A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Generating digital signatures using ephemeral cryptographic key |
US20060153370A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Generating public-private key pair based on user input data |
US20060156012A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Facilitating digital signature based on ephemeral private key |
US7162033B1 (en) * | 1999-03-26 | 2007-01-09 | Gemplus | Countermeasure procedures in an electronic component implementing an elliptical curve type public key encryption algorithm |
US20070071237A1 (en) * | 2004-11-11 | 2007-03-29 | Brown Daniel R | Custom static Diffie-Hellman groups |
US20070121933A1 (en) * | 2003-10-03 | 2007-05-31 | Yuichi Futa | Information transfer system, encryption device, and decryption device |
US20070189527A1 (en) * | 2005-01-21 | 2007-08-16 | Brown Daniel R L | Elliptic curve random number generation |
US7286666B1 (en) * | 1999-03-26 | 2007-10-23 | Gemplus | Countermeasure method in an electric component implementing an elliptical curve type public key cryptography algorithm |
US20080019509A1 (en) * | 2006-07-10 | 2008-01-24 | Al-Gahtani Theeb A | Scalar multiplication method with inherent countermeasures |
US20100106970A1 (en) * | 2004-04-30 | 2010-04-29 | Research In Motion Limited | Device authentication |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101233682B1 (en) | 2010-09-15 | 2013-02-15 | 고려대학교 산학협력단 | Calculating apparatus and method for elliptic curve cryptography |
-
2006
- 2006-03-23 DE DE102006013515A patent/DE102006013515A1/en not_active Withdrawn
-
2007
- 2007-03-06 JP JP2009501996A patent/JP2009531726A/en active Pending
- 2007-03-06 EP EP07726643A patent/EP1997000A1/en not_active Ceased
- 2007-03-06 WO PCT/EP2007/052075 patent/WO2007107450A1/en active Application Filing
- 2007-03-06 CN CN200780010399XA patent/CN101410792B/en not_active Expired - Fee Related
- 2007-03-06 US US12/225,480 patent/US8582761B2/en active Active
-
2008
- 2008-10-22 KR KR1020087025841A patent/KR101391216B1/en not_active Expired - Fee Related
-
2012
- 2012-03-26 JP JP2012069762A patent/JP2012123426A/en active Pending
Patent Citations (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5272755A (en) * | 1991-06-28 | 1993-12-21 | Matsushita Electric Industrial Co., Ltd. | Public key cryptosystem with an elliptic curve |
US20040250081A1 (en) * | 1991-09-17 | 2004-12-09 | Crandall Richard E. | Method and apparatus for digital signature authentication |
JPH1152853A (en) | 1997-07-30 | 1999-02-26 | Fujitsu Ltd | Prime number generation device, B-smoothness determination device, and recording medium |
US6330332B1 (en) | 1997-07-30 | 2001-12-11 | Fujitsu Limited | Prime number generation apparatus B-smoothness judgement apparatus and computer memory product |
JPH11234259A (en) | 1998-02-13 | 1999-08-27 | Hitachi Ltd | Opponent authentication and key distribution method, device using the same, and encryption communication method and encryption communication system |
US6738478B1 (en) * | 1998-10-28 | 2004-05-18 | Certicom Corp. | Power signature attack resistant cryptography |
US7162033B1 (en) * | 1999-03-26 | 2007-01-09 | Gemplus | Countermeasure procedures in an electronic component implementing an elliptical curve type public key encryption algorithm |
US7286666B1 (en) * | 1999-03-26 | 2007-10-23 | Gemplus | Countermeasure method in an electric component implementing an elliptical curve type public key cryptography algorithm |
US6829356B1 (en) | 1999-06-29 | 2004-12-07 | Verisign, Inc. | Server-assisted regeneration of a strong secret from a weak secret |
US20020073311A1 (en) * | 2000-09-21 | 2002-06-13 | Ichiro Futamura | Public-key certificate issuance request processing system and public-key certificate issuance request processing method |
DE10161138A1 (en) | 2001-12-12 | 2003-07-03 | Siemens Ag | Elliptical curve determination method for cryptographic techniques involves evaluating curve to be tested as elliptical curve if defined cryptographic quality criterion is fulfilled for twisted elliptical curve |
DE10161137A1 (en) | 2001-12-12 | 2003-10-02 | Siemens Ag | Cryptographic data processing system for signature verification tests elliptical and twisted curves and uses one coordinate for data encryption and transmission |
JP2003255831A (en) | 2002-02-28 | 2003-09-10 | Hitachi Ltd | Elliptic curve scalar multiplication calculation method and apparatus |
US20040264692A1 (en) * | 2003-06-30 | 2004-12-30 | Garay Juan A. | Method and system for determining sequence parameters to limit cycle attacks in timed release cryptography |
US20070121933A1 (en) * | 2003-10-03 | 2007-05-31 | Yuichi Futa | Information transfer system, encryption device, and decryption device |
US20100106970A1 (en) * | 2004-04-30 | 2010-04-29 | Research In Motion Limited | Device authentication |
JP2005321719A (en) | 2004-05-11 | 2005-11-17 | Ntt Docomo Inc | COMMUNICATION SYSTEM, DECRYPTION DEVICE, RESTORE DEVICE, KEY GENERATION DEVICE, AND COMMUNICATION METHOD |
US20070071237A1 (en) * | 2004-11-11 | 2007-03-29 | Brown Daniel R | Custom static Diffie-Hellman groups |
US20060156012A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Facilitating digital signature based on ephemeral private key |
US20060153369A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Providing cryptographic key based on user input data |
US20060153370A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Generating public-private key pair based on user input data |
US20060153371A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Generating digital signatures using ephemeral cryptographic key |
US20060156013A1 (en) * | 2005-01-07 | 2006-07-13 | Beeson Curtis L | Digital signature software using ephemeral private key and system |
US20070189527A1 (en) * | 2005-01-21 | 2007-08-16 | Brown Daniel R L | Elliptic curve random number generation |
US20080019509A1 (en) * | 2006-07-10 | 2008-01-24 | Al-Gahtani Theeb A | Scalar multiplication method with inherent countermeasures |
US7864951B2 (en) * | 2006-07-10 | 2011-01-04 | King Fahd University Of Petroleum And Minerals | Scalar multiplication method with inherent countermeasures |
Non-Patent Citations (9)
Title |
---|
Baier et al, Generation Methods of Elliptic Curves, Aug. 27, 2002, http://www.ipa.go.jp/security/enc/CRYPTEC/fy15/doc/1030-Buchmann.evaluation.pdf. * |
Chaum D. et. al., International Association for Cryptologic Research: "Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer", Advances in Cryptology, Santa Barbara, Aug. 11-15, 1991, Proceedings of the Conference on Theory and Applications of Cryptographic Techniques (CRYPTO), Berlin, Springer, DE, Apr. 16, 1992, pp. 470-484. |
Daniel R. L. Brown und Robert P. Gallant, "The Static Diffie-Hellman Problem", Jun. 23, 2005, (Internet: http://www.cacr.math.uwaterloo.ca/conferences/2005/ecc2005/gallant.pdf. |
Fouguet et al, 2001, Eurocrypt, Finding Secure Curves, pp. 1-29. * |
Gadiel Seroussi; "Elliptic curve cryptography" in Information Theory and Networking Workshop, IEEE, Metsovo, Greece, Jun. 27-Jul. 1, 1999. |
German language Japanese Office Action for related Japanese Patent Application No. 2009-501996, mailed on Jun. 9, 2011. |
Horiuchi, Keiji, at al., "Notes on Finding Elliptic Curve with Prime Order and the Amount of Calculation", Institute of Electronics, Information and Communication Engineers, vol. 98, Nr. 228, pp. 31-36, Jul. 31, 1998. |
Katsuyuki Okeya et al., "A Hybrid Hardware Attack Surpasses Side Channel and Fault Attacks", IEICE Technical Report, Mar. 12, 2002, vol. 101, No. 732, 7 pages. |
Li et al, Quantitative Evaluation of Side-Channel Security for Elliptic Curve Cryptosystems, pp. 1-4. * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12381729B2 (en) * | 2022-03-18 | 2025-08-05 | Stmicroelectronics Belgium | Protection of a secret key |
Also Published As
Publication number | Publication date |
---|---|
EP1997000A1 (en) | 2008-12-03 |
KR20080111089A (en) | 2008-12-22 |
CN101410792B (en) | 2013-03-06 |
US20090285388A1 (en) | 2009-11-19 |
CN101410792A (en) | 2009-04-15 |
KR101391216B1 (en) | 2014-05-02 |
JP2012123426A (en) | 2012-06-28 |
JP2009531726A (en) | 2009-09-03 |
WO2007107450A1 (en) | 2007-09-27 |
DE102006013515A1 (en) | 2007-10-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8300811B2 (en) | Method and device for processing data | |
US9832018B2 (en) | Method of generating a public key for an electronic device and electronic device | |
WO2019144612A1 (en) | Zero-knowledge multi-account-book exchange transfer method and apparatus based on blockchain, and storage medium | |
Kim et al. | Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme | |
US8121290B2 (en) | Pseudo-random function calculating device and method and number-limited anonymous authentication system and method | |
US7000110B1 (en) | One-way function generation method, one-way function value generation device, proving device, authentication method, and authentication device | |
CN104488219A (en) | Method and system for secure communication between radio frequency identification tags and reading devices | |
JP2007510336A (en) | Method and apparatus for generating verifiable public key | |
CN111161056A (en) | A method, system and device for improving the security of digital asset transactions | |
US8582761B2 (en) | Cryptographic method with elliptical curves | |
CN106100823B (en) | Password protection device | |
EP3785399B1 (en) | Method for generating on-board a cryptographic key using a physically unclonable function | |
CN106034122A (en) | Information processing method, electronic equipment and server | |
US20110107097A1 (en) | Method for encoded data exchange and communication system | |
EP4125236A1 (en) | Secret code verification protocol | |
CN112837064B (en) | Signature method, signature verification method and signature verification device for alliance chain | |
CN111262707B (en) | Digital signature method, verification method, device and storage medium | |
JP2003152716A (en) | Qualification authentication method using variable authentication information | |
KR100971038B1 (en) | Encryption method for distributing load among multiple entities and their devices | |
CN115277240A (en) | Authentication method and device for Internet of things equipment | |
CN114491635A (en) | Block chain anonymous voting method, equipment and storage medium based on homomorphic encryption | |
CN114186998A (en) | Privacy communication method based on block chain | |
US11438146B1 (en) | System and method for performing key exchange while overcoming a malicious adversary party | |
JP2833427B2 (en) | Electronic voting system | |
Hsu | A group digital signature technique for authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SIEMENS AKTIENGESELLSCHAFT, GERMANY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GEORGIADES, JEAN;KARGL, ANTON;MEYER, BERND;REEL/FRAME:021589/0362;SIGNING DATES FROM 20080805 TO 20080811 Owner name: SIEMENS AKTIENGESELLSCHAFT, GERMANY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GEORGIADES, JEAN;KARGL, ANTON;MEYER, BERND;SIGNING DATES FROM 20080805 TO 20080811;REEL/FRAME:021589/0362 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |